Shaking Up the Top of Cyber Command

by Jason Healey

As I have previously written, U.S. Cyber Command has grown up, and its elevation to a unified combatant command will soon be complete. The focus can now switch to a far more critical issue: splitting...

Kaspersky Antivirus Hack a Wake Up Call for Business

by Michael Sulmeyer

Russian state-sponsored hackers were able to steal National Security Agency material on methods they use to conduct cyber espionage as well as how they help defend critical U.S. government networks,...

Cyber Command Is Growing Up. Now For the Real Issue.

by Jason Healey

The Cipher Brief Cyber Advisory Board convenes meetings with some of the most innovative thinkers across government and the private sector, tackling a range of cyber threats. Meetings are...

The Making of a Cyber Diplomat

by Michael Sulmeyer and Gabriella Roncone

By now, you’ve probably heard the news that the U.S. State Department is losing its top diplomat on issues relating to cybersecurity, Chris Painter. In addition, the rumors are that those...

When the NSA Spots a Crack in Commercial Software – Should It Tell?

by Natalie Vanatta

One of the only tasks the U.S. Constitution declares that the federal government must do is to provide for the common defense. That is the government’s foundational truth and purpose; to protect...

WannaCry, NotPetya: Worm Me Once, Shame on You; Worm Me Twice…

by Jason Healey

The newest ransomware attack called NotPetya has re-ignited the debate ongoing since the earlier WannaCry attack. Cybersecurity experts, policymakers, and citizens affected have all asked: who...

There’s More to Life than Zero-Days

by Adam Vincent

A zero-day, meaning a tool used to exploit a newly discovered computer vulnerability, alone does not make an attack. It is but one element of many in an attack, chain and there’s much more we...